-
1241
APT Adversarial Defence Mechanism for Industrial IoT Enabled Cyber-Physical System
Published 2023-01-01“…The objective of Advanced Persistent Threat (APT) attacks is to exploit Cyber-Physical Systems (CPSs) in combination with the Industrial Internet of Things (I-IoT) by using fast attack methods. …”
Get full text
Article -
1242
Jamming-resilient algorithm for underwater cognitive acoustic networks
Published 2017-08-01“…The channel sharing mechanism in cognitive networks can improve the communication capacity efficiently. Jamming attack is a common deny of service attack in cognitive networks. …”
Get full text
Article -
1243
A Very Rare Cause of Pleuritic Chest Pain: Bilateral Pleuritis as a First Sign of Familial Mediterranean Fever
Published 2013-01-01“…After the colchicine treatment, the attack has not developed. In conclusion, recurrent pleural effusion and pleuritic chest pain may be the first signs of the FMF.…”
Get full text
Article -
1244
Transportation Laws for Carbonate and Sulfate Ions in Concrete Based on Compartment Model
Published 2020-01-01“…The compartment model in this article provides references for predicting the drying-wetting varied cycles and ions attack depth of concrete under carbonate and sulfate ions attack.…”
Get full text
Article -
1245
IMPROVING INTRUSION DETECTION USING TREE ADJOINING GRAMMAR GUIDED GENETIC PROGRAMMING
Published 2017-09-01“…Detection and prevention of network attacks have been the main topic of many researchers in the World. …”
Get full text
Article -
1246
Defensive Regurgitation by a Noctuid Moth Larva (Litoprosopus Futilis)
Published 1993-01-01“…Larvae regurgitated when attacked by lycosid spiders and derived some protection from this behavior. …”
Get full text
Article -
1247
Analysis and defense of the BlackEnergy malware in the Ukrainian electric power system
Published 2017-01-01“…Based on different versions of samples of BlackEnergy acquired, the attack mode was analyzed and the prevention of the virus was provided under the proper analysis environment.…”
Get full text
Article -
1248
Encrypted and obfuscation WebShell detection for high-speed network traffic
Published 2022-08-01“…With the gradual development of traffic encryption and text obfuscation technologies, it is increasingly difficult to prevent complicated and malicious WebShell attack events in production environment using traditional detection methods based on text content and network flow features, especially for adversarial samples, variant samples and 0Day vulnerability samples.With the established network traffic collection environment, DPDK technology was used to capture network traffic in the high-speed network environment, and a dataset was marked with label.The dataset consisted of more than 24,000 normal traffic and more than 10,000 malicious WebShell traffic under different platforms, different languages, different tools, different encryption and obfuscation methods.Then Asynchronous traffic analysis system framework and lightweight log collection components were used to efficiently parse raw traffic.Expert knowledge was integrated to analyze HTTP data packets during the communication process of several popular WebShell management tools, and the effective feature set for encrypted and obfuscation WebShell was obtained.Support Vector Machine (SVM) algorithm was used to realize offline training and online detection of complicated WebShell malicious traffic based on the effective feature set.Meanwhile, improving the parameter search method with the genetic algorithm promoted the model training efficiency furthermore.The experimental results showed that the detection efficiency can be guaranteed based on the self-built WebShell attack traffic dataset.Besides, the detection model has a precision rate of 97.21% and a recall rate of 98.01%, and it performed well in the comparative experiments of adversarial WebShell attacks.It can be concluded from the results that the proposed method can significantly reduce the risk of WebShell attack, effectively supplement the existing security monitoring system, and be applied in real network environments.…”
Get full text
Article -
1249
XI2S-IDS: An Explainable Intelligent 2-Stage Intrusion Detection System
Published 2025-01-01“…The rapid evolution of technologies such as the Internet of Things (IoT), 5G, and cloud computing has exponentially increased the complexity of cyber attacks. Modern Intrusion Detection Systems (IDSs) must be capable of identifying not only frequent, well-known attacks but also low-frequency, subtle intrusions that are often missed by traditional systems. …”
Get full text
Article -
1250
An efficient cryptographic technique using modified Diffie–Hellman in wireless sensor networks
Published 2020-06-01“…The Diffie–Hellman has been modified to secure it against attacks by generating a hash of each value that is transmitted over the network. …”
Get full text
Article -
1251
Evaluation of zonulin levels in patients with migraine
Published 2025-02-01“…The zonulin level did not correlate with disease duration, attack duration, VAS score, or attack frequency (p > 0.05). …”
Get full text
Article -
1252
An Adaptive Intrusion Detection System for Evolving IoT Threats: An Autoencoder-FNN Fusion
Published 2025-01-01“…The increasing sophistication of attacks targeting the Internet of Things environment underscores the critical need for robust intrusion detection systems. …”
Get full text
Article -
1253
Assessment of the Prevalence and Patterns of Violence against Healthcare Workers in Nigeria: A Multicentre Study
Published 2024-12-01“…Conclusions: The overall prevalence of violent attacks on HCWs was high. The perpetrators of violent attacks were mainly patient relatives and patients/clients. …”
Get full text
Article -
1254
New image encryption algorithm based on double chaotic system and compressive sensing
Published 2022-10-01“…Image encryption technology plays an important role in today’s multimedia applications and Internet information security transmission.However, most image encryption algorithms still have problems, for example, cipher images occupied high bandwidth during transmission, image encryption speed is slow, image encryption algorithms are not associated with plain image, and there is no complete ciphertext feedback mechanism.These problems all affect the security and easy use of image encryption algorithms.In order to solve the above problems, the compressive sensing technology and chaotic system were studied, and a new image encryption algorithm based on double chaotic system and compressive sensing with plaintext association was proposed.The plaintext image association key was used to associate the plain image hash value with the Logistic chaotic system parameters.Discrete wavelet transform, was used to sparse the plain image.Then the random measurement matrix was generated by the Logistic chaos system, and the image was encrypted once by combining the compressive sensing technique and the random measurement matrix to obtain the intermediate image.The intermediate image was hashed again, and the Rucklidge chaos system initial value was associated with the plain image hash value together.The Rucklidge chaotic system and encryption algorithm were used to control the intermediate image for secondary encryption and accordingly obtain the cipher image.The encryption algorithm was a new plaintext correlation encryption algorithm, which used the image’s own pixel value to control the scrambling of the intermediate image.It also enhanced the plaintext association and established a ciphertext feedback mechanism.Simulation results and performance analysis show that the algorithm has good encryption performance.The encrypted image can be compressed according to the compression ratio, effectively reducing the size of the cipher image.Moreover, it is resistant to common attacks such as known plaintext attack, selective plaintext attack and differential attack, which is better than other common image encryption algorithms.…”
Get full text
Article -
1255
Botox (OnabotulinumtoxinA) for Treatment of Migraine Symptoms: A Systematic Review
Published 2022-01-01“…BoNT-A can reduce the frequency of migraine attacks per month and diminish the severity of pain.…”
Get full text
Article -
1256
Migraine and restless legs syndrome – is there an association?
Published 2023-10-01“…The principle of migraine treatment is to suppress pain and reduce the frequency of attacks. Treatment for restless legs syndrome is based on the relief of symptoms. …”
Get full text
Article -
1257
Characterization of patients with cerebrovascular diseases in the acute stage according to traditional Chinese diagnosis
Published 2023-11-01“…Intraparenchymal cerebral hemorrhages: 62.5% severe tense attack; and 71.4% liver fire. Subarachnoid hemorrhage: 15% as severe flaccid type attack; and 17.6% liver Yin deficiency syndrome. …”
Get full text
Article -
1258
Prospective Study on Retinal Nerve Fibre Layer Thickness Changes in Isolated Unilateral Retrobulbar Optic Neuritis
Published 2013-01-01“…The baseline RNFL thickness was similar in the attack and fellow eye (P≥0.4). At 3 months, the attack eye had a thinner temporal (P=0.02) and average (P=0.05) RNFL compared to the fellow eye. …”
Get full text
Article -
1259
Sink Location Protection Protocols Based on Packet Sending Rate Adjustment
Published 2016-01-01“…Most existing work related to sink location protection focuses on local traffic analysis attack. In this paper, we study the sink location protection problem under a more powerful type of attack, the global traffic analysis attack. …”
Get full text
Article -
1260
Social Engineering Analysis Framework: A Comprehensive Playbook for Human Hacking
Published 2025-01-01“…Social Engineering attacks are among the most exploited methods in today’s cybersecurity threat landscape. …”
Get full text
Article